an infestation designed to copy itself repeatedly to memory, on drive space, or on a network

adware

digital certificate

grayware

keylogger

dictionary attack

social engineering

tailgating

Trojan

zombie

worm


worm

Computer Science & Information Technology

You might also like to view...

What is the output of the third println statement in the main method?

``` public class Foo { int i; static int s; public static void main(String[] args) { Foo f1 = new Foo(); System.out.println("f1.i is " + f1.i + " f1.s is " + f1.s); Foo f2 = new Foo(); System.out.println("f2.i is " + f2.i + " f2.s is " + f2.s); Foo f3 = new Foo(); System.out.println("f3.i is " + f3.i + " f3.s is " + f3.s); } public Foo() { i++; s++; } } ``` a. f3.i is 1 f3.s is 1 b. f3.i is 1 f3.s is 2 c. f3.i is 1 f3.s is 3 d. f3.i is 3 f3.s is 1 e. f3.i is 3 f3.s is 3

Computer Science & Information Technology

The orientation of the left or right edges of the paragraph,in relation to the left or right margin is called:

A) horizontal alignment. B) landscape orientation. C) portrait orientation. D) spacing.

Computer Science & Information Technology

To remove a hyperlink, highlight the text and click the Remove Hyperlink button on the Home tab

Indicate whether the statement is true or false

Computer Science & Information Technology

For individuals who do not have access to the network, you can make a copy of a shared workbook and send it to them via ________

Fill in the blank(s) with correct word

Computer Science & Information Technology